Active Chat monitoring and Suspicious Chat Detection
The increasing demand of security for chat communication is a large scale problem which must be noticed .Using internet the chat communication is going widely and popular in the world but the problem of security for organizational reasons such as use of wrong conversation sho
2025-06-28 16:30:08 - Adil Khan
Active Chat monitoring and Suspicious Chat Detection
Project Area of Specialization Cyber SecurityProject SummaryThe increasing demand of security for chat communication is a large scale problem which must be noticed .Using internet the chat communication is going widely and popular in the world but the problem of security for organizational reasons such as use of wrong conversation should be matter between two parties or multiple ..Another problem should be notice that using of another applications such as Messenger ,Whats,app and Gmail, a third party such as organization owner and administration group should do not know the secret conversation of this chat applications if it going against the sensitive organization. The need of this chat monitoring is very important for any secure and sensitive organization such as army and intelligence agencies to monitor the full activities of communication of internal employers because the internal employers are most dangerous threat for any organization. This project is based on the chatting communication of single or group users while the need of much security for any special internal organization such as defense areas. This project “Active chatmonitoring and suspicious chat detection” will handle these like problems for secure organization .Using the dual functionality mode of communication such as Internet mode and intranet mode, both are the secure source of transferring secure communication between sender and receiver and the monitoring of admin.Using the socket programing it’s possible to chat within the organization which is good. Active chat monitoring can handle the overall communication of sender and receiver by using the algorithm of server filtration of chats.. If some bodies use the suspicious keywords which are dangerous for any organization means the requirements of a defense and sensitive organization then it will be monitored by the admin of the system and the admin can have the rights to check the conversation of the users which have violated the rules of organization by miss use of illegal words such as bomb, kill and wanted etc. The suspicious key words must be set by admin for secure and safe communication and if somebody uses it they will target by tracing the IP of the system and can forwarded for further investigation.
Project ObjectivesThe purpose of the chat application is to allow users be able to the chat with each other, like a normal chat application. The users will be able to chat with each other, most likely only from user to user, no group chatting will be developed, unless there is time to do so .Active chat application is monitoring application for chatting and to control chat over network following are the main objectives and goals.
- This system will reduce illegal activities held on internet or intranet.
- This system will provide security for many organization.
- This system will act as an evidence for investigation.
- This system can be used by government officials to check any suspicious activities that are going on the this applications.
- Third parties such as Detective can also this type of system legally.
- The system is used to track the IP address of both the chatting parties.
The methodology which mostly suit with our Active Chat Monitoring application is the Water Fall Model. The Waterfall Model was the first Process Model to be introduced. It is also referred to as a linear-sequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed before the next phase can begin and there is no overlapping in the phases.
The waterfall Model illustrates the software development process in a linear sequential flow. This means that any phase in the development process begins only if the previous phase is complete. In this waterfall model, the phases do not overlap.
- Upfront documentation and planning stages allow for large or shifting teams to remain informed and move towards a common goal.
- Is simple to understand, follow and arrange tasks.
- Facilitates departmentalization and managerial control based on schedule or deadlines.
- Allows for early design or specification changes to be made easily.
- Clearly defines milestones and deadlines.
Active chat monitoring application using data mining algorithm for sending and receiving messages. A suspicious key words must be define for suspicious chat detection and takes the monitoring of ongoing messages. The suspicious key words should define according to the need of the organization
Active chat monitoring is best due to the following features
- Accurate authentication
Due to this feature users have different types such as admin of the system, operators and normal users of the system can login with their specific IDs and all the users have their special role such as common user only to use this app while admin have full rights for this app.
- User friendly
The active chat monitoring application is so user friendly and the best way to use this application for messages conversation is easy to use it.
- Adding suspicious key words
Admin have the rights to add the suspicious key words for secure and pure chat communication depending on the needs of the company or organization which type of conversation they wants to allow for the users to communicate with each other.
- Dual mode of use
User can use both modes of this application such as intranet or internet for their secure communication depending on the need of the users and his secret communication which they wants to do with second user or in the group.
- Use as a Evidence
If someone violated the rules of the company by using the suspicious key words in their conversation so they will be interrupted by sending a notification to the admin with their IP addresses and the full messages now the admin can check the record of the user who violated the rules. Now the admin have the rights to use this illegal conversation for as a evidence.
This system will mostly use in the security organization and sensitive companies where each and word should use according to the rules of an organization. Internal employers can use this application as well it’s good for it because messages chatting is very important aspect of every society which is needed to provide it for the organization staff but if there came the talk of security then other applications fail to fulfill this need of security to provide it for the third party to see the conversation going between two parties or group of parties because within sensitive organization it’s very important to monitor the communication very well otherwise its will create a lot of problems of security for such sensitive organization. Global security is very important for data sharing during the use of internet path because the monitor is very important also globally. As we see the other chat applications they can’t provide this kind of facility for third party to monitor the conversation of two parties because it’s never include in the policies of such organization so for this we noticed that such kind of application should be developed which fulfill the needs of third party.
Technical Details of Final DeliverableWorking procedure is to very simple by means that it developed like other chat applications but little changes such as the authorities is very high with administration if they wants to add you or remove you and all the users are under the super vision of admin. The using procedure is very simple every user can use it without any worries but if changes from other users then the main thing is the admin section which are denied from other users.
Software Requirements
The software which we use for the development of Desktop Application is;
- The operating which we use for desktop development was window 10.
- Database for internal application is SQL Server management studio 2014.
- For platform development we use Visual studio 2013.
- The Programming language we use for development is C#.
Hardware Requirements
| Items | Processors | Ram | System Storage | Data Server Memory Space |
| Requirements for internal System | 2x1.6GHz CPU | 1GB Ram | 240 GB Hardesk for internal storage | 1 TB space for data storage. |
Items
Requirements for internal System
Final Deliverable of the Project HW/SW integrated systemType of Industry IT Technologies Big DataSustainable Development Goals Industry, Innovation and InfrastructureRequired Resources| Elapsed time in (days or weeks or month or quarter) since start of the project | Milestone | Deliverable |
|---|---|---|
| Month 1 | Literature | Study and observe |
| Month 2 | Analysis of Proposed Project | Study and observe |
| Month 3 | Preparation of Project | find a way of implementation |
| Month 4 | Implementation of Project | Starting of projects |
| Month 5 | Module 1 | Start and complete Module 1 |
| Month 6 | Module 2 | Start and complete Module 2 |
| Month 7 | Module 3 | Start and complete Module 3 |
| Month 8 | Module 4 | Start and complete Module 4 |
| Month 9 | Result Formulation | Final the Requirements |
| Month 10 | Implementation the Project completely | Complete and Test all modules |
| Month 11 | Analysis | Achieve the Final Objectives |
| Month 12 | Final Write-up & Thesis Submission | Complete the Project |